CN103339978B - For providing the technology of criminal's imaging of improvement - Google Patents
For providing the technology of criminal's imaging of improvement Download PDFInfo
- Publication number
- CN103339978B CN103339978B CN201180066022.2A CN201180066022A CN103339978B CN 103339978 B CN103339978 B CN 103339978B CN 201180066022 A CN201180066022 A CN 201180066022A CN 103339978 B CN103339978 B CN 103339978B
- Authority
- CN
- China
- Prior art keywords
- terminal device
- client terminal
- difference
- pixel data
- multiple photos
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/52—Surveillance or monitoring of activities, e.g. for recognising suspicious objects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/103—Static body considered as a whole, e.g. static pedestrian or occupant recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/65—Environment-dependent, e.g. using captured environmental data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/68—Gesture-dependent or behaviour-dependent
Abstract
There is disclosed herein the technology of criminal's imaging for providing improvement.In a specific illustrative embodiment, these technology can be implemented as a kind of method of criminal's imaging for providing improvement, the method includes: a client terminal device is identified as at least one in losing and being stolen, a difference in detection is relevant with a visual pattern first frame on this client terminal device the first pixel data and the second pixel data that second frame with this visual pattern is correlated with, and capture multiple photos in response to this difference of detection on this client terminal device.Its objective is that increasing criminal is displayed on the probability on these photos.
Description
This application claims the priority of the U.S. Serial No 12/964,972 of December in 2010 submission on the 10th, disclosure of which
It is combined in this in full with it by quoting.
Disclosure field
Present disclosure generally relates to antitheft solution, and more particularly relate to provide the criminal's imaging improved
Technology.
Disclose background
Mobile device (such as, laptop computer, mobile phone, panel computer (PC), net book, personal digital assistant
(PDA) user and commercial use) increase the most rapidly.Equally, mobile device theft is shifted along the increasing that device uses
Add and increase.Therefore, a lot of mobile devices are equipped with some burglar-proof mechanism.But, currently used a lot of burglar-proof mechanisms operation
Inefficient and inoperative.
Because afore-mentioned, it is to be appreciated that there is the serious problems relevant with current anti-theft technique and defect.
Disclose summary
There is disclosed herein the technology of criminal's imaging for providing improvement.In a specific illustrative embodiment, this
A kind of method that a little technology can be implemented as criminal's imaging for providing improvement, the method includes: by a client dress
Put at least one being identified as in losing and being stolen, detection and first frame of a visual pattern on this client terminal device
A difference in the first relevant pixel data and the second pixel data relevant to this visual pattern second frame, and
This client terminal device captures multiple photos in response to this difference of detection.
According to other aspects of this specific illustrative embodiment, in being identified as this client terminal device losing and being stolen extremely
Few a kind of may further include accesses the client terminal device status data stored on one server.
According to the other aspect of this specific illustrative embodiment, detect this difference may further include detection with many groups
A difference in the first pixel data that pixel is relevant and the second pixel data relevant to this many groups pixel.
According to some additional aspect of this specific illustrative embodiment, detect this difference and may further include detection and be somebody's turn to do
The mean differences organized in the first relevant pixel data of pixels and the second pixel data relevant to this many groups pixel more.
According to other aspects of this specific illustrative embodiment, detect this difference and may further include detection beyond one
One difference of predetermined threshold.
According to the other aspect of this specific illustrative embodiment, detect this difference and may further include at one predetermined
One difference of detection in time period.
According to some additional aspect of this specific illustrative embodiment, the method may further include: in this client
On device, determine a confidence level of each width in this multiple photos, on this client terminal device, based in this multiple photos
This multiple photos is ranked up by the confidence level of each width, and by network by the highest for having in this multiple photos
The one or more of ranking are transmitted to a server.
According to other aspects of this specific illustrative embodiment, determine that confidence level may further include one face of execution
Portion's detection algorithm.
According to the other aspect of this specific illustrative embodiment, the method may further include at this client terminal device
Upper is that each width in this multiple photos determines a positional value, and this positional value indicates position that may be facial in a photos.
According to some additional aspect of this specific illustrative embodiment, the method may further include and fills in this client
Putting and determine a size value for each width in this multiple photos, this size value indicates chi that may be facial in a photos
Very little.
According to other aspects of this specific illustrative embodiment, it is ranked up farther including based on this to this multiple photos
In multiple photos, the confidence level of each width, positional value and size value are ranked up.
According to the additional aspect of this specific illustrative embodiment, these technology can be implemented as at least one permanent processor
Readable storage medium storing program for executing, the computer program that this storage medium is made up of instruction for storage, these instructions are configured to can
Read by least one processor, to instruct this at least one processor one computer processes of execution.
In another specific illustrative embodiment, these technology can be implemented as a kind of criminal for providing improvement
The goods of imaging, these goods include at least one permanent processor readable medium and are stored in the finger on this at least one medium
Order, wherein these instruction be configured to can by least one processor from this at least one medium read and hence in so that this at least
The operation of one processor so as a client terminal device to be identified as in losing and being stolen at least one, at this client terminal device
The first pixel data that upper detection is relevant to a visual pattern first frame and second frame with this visual pattern
A relevant difference in the second pixel data, and on this client terminal device, capture many in response to detecting this difference
Photos.
In another specific illustrative embodiment, these technology can be implemented as a kind of criminal for providing improvement
The system of imaging, this system includes the one or more processors being communicatively connected to a network, wherein this or many
Individual processor is arranged at least one being identified as by a client terminal device in losing and being stolen;At this client terminal device
On, detect first pixel data relevant to a visual pattern first frame and second frame with this visual pattern
A relevant difference in the second pixel data, and capture several in response to this difference of detection on this client terminal device
Photo.
According to the other aspect of this specific illustrative embodiment, these one or more processors can be configured to
During this client terminal device is identified as losing and being stolen by the client terminal device status data that access stores on one server
At least one.
According to some additional aspect of this specific illustrative embodiment, these one or more processors can be configured to lead to
Cross the difference detected in the first pixel data relevant to many group pixels and the second pixel data relevant with this many groups pixel
Value detects this difference.
According to other aspects of this specific illustrative embodiment, these one or more processors can be configured to inspection
Survey in the first pixel data relevant to this many groups pixel and the second pixel data relevant with this many groups pixel average
Difference detects this difference.
According to the other aspect of this specific illustrative embodiment, these one or more processors can be configured to
Detection detects this difference beyond a difference of a predetermined threshold.
According to some additional aspect of this specific illustrative embodiment, these one or more processors can be configured to lead to
Cross and in a predetermined amount of time, detect a difference to detect this difference.
According to some additional aspect of this specific illustrative embodiment, these one or more processors can be configured to
On this client terminal device, determine a confidence level of each width in this multiple photos, many based on this on this client terminal device
In photos, this multiple photos is ranked up by the confidence level of each width, and by a network by this multiple photos
There are top ranked one or more transmit to a server.
Referring now to the exemplary embodiment of the present disclosure shown in accompanying drawing present disclosure described in more detail.Although with
Lower reference exemplary embodiment describes present disclosure, but it is to be understood that present disclosure is not used in is limited to this.Utilize these technology
It will be appreciated by those of ordinary skill in the art that making of additional implementation, amendment mode and embodiment and other field
With all within the scope of disclosure described herein, and present disclosure can have notable effectiveness for them.
Brief Description Of Drawings
In order to help to be more fully understood from present disclosure, with reference now to accompanying drawing, the most similar element comes with similar numeral
Quote.These accompanying drawings are not construed as limiting present disclosure, are only used for exemplary.
Fig. 1 illustrates the block diagram describing a kind of network architecture according to an embodiment of present disclosure, and this network architecture comprises
One for providing the platform of criminal's imaging of improvement.
Fig. 2 depicts the block diagram of a kind of computer system according to an embodiment of present disclosure.
Fig. 3 illustrates multiple modules of a client according to an embodiment of present disclosure.
Fig. 4 illustrates a server anti-theft module according to an embodiment of present disclosure.
Fig. 5 illustrates pixel data according to an embodiment of present disclosure.
A kind of method that Fig. 6 illustrates criminal's imaging for providing improvement according to an embodiment of present disclosure.
Fig. 3 depicts another kind of for the method providing criminal's imaging of improvement according to an embodiment of present disclosure.
The detailed description of exemplary
In mobile device (such as, laptop computer, mobile phone, flat board PC, net book, PDA), operation is current
Burglar-proof mechanism can be configured to respond to mobile device be marked as lose or stolen and from the shooting being connected to mobile device
Machine capture photo.This burglar-proof mechanism capture photo, it is intended to obtaining the image of criminal, this image can be used for regaining loss
Or stolen mobile device.But, there are some problems in these current burglar-proof mechanisms.First, mobile device is configured to
Photo (such as, capturing a photos every 10 seconds) is captured based on intervalometer.Therefore, the probability of criminal's image is captured
Relatively low.Secondly, mobile device may not use useful image (such as, the bag that any technology comprises criminal to select most probable
Image containing face can be recognized) according to be transferred to server (such as, antitheft back-end server).Therefore, the net of photo is transmitted
Network resource may not be utilized effectively.
In one embodiment, it is provided that for providing some technology of criminal's imaging of improvement.In this embodiment
In, can be identified as mobile device losing or stolen.Based on this identification, mobile device can be configured in response to shifting being detected
Move the movement in device and capture photo.In certain embodiments, detect this movement and can include that detection is connected to mobile dress
Difference at least two frames of the visual pattern (such as, capture region) of the video camera put.It is to say, can be by mobile device
It is configured to the first frame (such as, institute of the visual pattern on a concrete time point of the visual pattern obtained in the first moment
Have the state of pixel) the second frame (such as, vision on another concrete time point of visual pattern of obtaining with the second moment
The state of all pixels of image) compare, bigger to determine whether this two frame difference.In other embodiments, detect this
Movement can include analyzing the data produced by any one in accelerometer, movable sensor and inclination sensor or combination.
Such as, if movement being detected in the mobile device, be connected to the video camera of mobile device can capture a width or
Multiple photos.But, if being not detected by mobile in the mobile device, mobile device can wait that expression two frame differences are bigger
Data.
In another embodiment, it is provided that for providing the technology of criminal's imaging of improvement.In such an embodiment,
Mobile device can utilize one or more face detection algorithm to calculate in photo to comprise the confidence level of face.Mobile dress
Put and be also based on corresponding confidence level one or more photo is ranked up.There are top ranked one or more shine
Sheet can transmit to server (such as, antitheft back-end server) to reduce net necessary to the anti-theft technique implementing to discuss at present
Network stock number.In some embodiments it is possible to calculate the position of facial positions possible in instruction photo for every photos
The size value of face size possible in value and instruction photo.Therefore, it can compare based on confidence level, positional value and size value
Sheet is ranked up.
Fig. 1 illustrates the block diagram describing the network architecture 100 according to an embodiment of present disclosure, and this network architecture comprises use
In the platform providing the criminal's imaging improved.Fig. 1 is the simplification view of the network architecture 100, and this view can include not describing
Additional elements.The network architecture 100 can comprise client 110, client 120, server 140A and server 140B(it
One or more computer systems 200 that can utilize shown in Fig. 2 in are implemented).Client 110, client 120, clothes
Business device 140A and server 140B can be communicatively connected to network 150.Server 140A can be communicatively connected to
Storage device 160A (1)-(N), and server 140B can be communicatively connected to store device 160B (1)-(N).Server
140A can comprise server anti-theft module 142.Server 140A and server 140B can be communicatively connected to SAN(and deposit
Storage Local Area Network) structure 170.SAN fabric 170 can pass through network 150 back-level server 140A and server 140B and visitor
Family end 110 and the client 120 access to storage device 180 (1)-(N).Server 140A can be communicatively connected to network
190.Client 120 could be included for providing one or more modules of the criminal's imaging improved, and these modules include visitor
Family end anti-theft module 122, photo capture module 124 and upper transmission module 126.
With reference to the computer system 200 of Fig. 2, modem 247, network interface 248 or some additive methods can be used for
One or more connections to network 150 from client 110 and client 120 are provided.Client 120 can utilize such as
Web browser or other client softwares access the information on server 140A or server 140B.This client can permit
Permitted client 120 access server 140A or server 140B or storage device 160A (1)-(N), 160B (1)-(N) and/or
The data that one of 180 (1)-(N) is hosted.
Network 150 and 190 can be Local Area Network, wide area network (WAN), the Internet, cellular network, satellite network or
Allow at client 110, client 120, server 140A, server 140B and be communicatively connected to network 150 and 190
Other networks communicated between other devices.Network 150 and 190 may further include above-mentioned exemplary types
One of network or any amount, these networks run as separate network or run with other network cooperatings each.Network 150
With the 190 one or more agreements that can utilize one or more client or server, network 150 and 190 communicatively connects
It is connected to these clients or server.Network 150 and 190 may switch to or from one of other protocol conversions to network equipment
Or multiple agreement.Although network 150 and 190 being each depicted as a network, it should be appreciated that according to one or more realities
Executing example, network 150 and 190 can each include the network of multiple interconnection.
Storage device 160A (1)-(N), 160B (1)-(N) and/or 180 (1)-(N) can be network accessible storage
And can be local, long-range or they relative to client 110, client 120, server 140A or server 140B
Combination.Storage device 160A (1)-(N), 160B (1)-(N) and/or 180 (1)-(N) can utilize RAID
(" RAID "), tape, disk, storage area network (" SAN "), Internet Small Computer Systems Interface (" iSCSI ") SAN,
Fiber channel SAN, CIFS (" CIFS "), network attached storage (" NAS "), NFS
(" NFS "), memorizer based on light or other computer-accessible memory.Storage device 160A (1)-(N), 160B (1)-
And/or 180 (1)-(N) can be used for backing up, replicating or file purpose (N).
Can be smart phone, PDA, desktop computer, above-knee according to some embodiments, client 110 and client 120
Computer, server, another kind of computer or by wirelessly or non-wirelessly connecting another device being connected with network 150.Visitor
Family end 110 and client 120 can input from user, data base, file, network service and/or application programming interface connect
Receive data.
Server 140A and server 140B can be apps server, archives platform, backup server, rear end clothes
Business device, network storage device, media server, e-mail server, document management platform, enterprise search server or logical
Letter property it is connected to other devices of network 150.Server 140A and server 140B can utilize storage device 160A (1)-
(N), one of 160B (1)-(N) and/or 180 (1)-(N) store application data, replicate data, Backup Data or other
Data.Server 140A and server 140B can be main frame, such as application server, and these main frames can process in client
110 and client 120 and backup platform, between backup process and/or memorizer transmission data.According to some embodiments, clothes
Business device 140A and server 140B could be for backup and/or the platform of filing data.
Client anti-theft module 122, photo capture module 124, upper transmission module 126 and service are discussed more detail below
Device anti-theft module 142.
Fig. 2 depicts the block diagram of computer system 200 according to an embodiment of present disclosure.Computer system 200 is suitable for
In implementing the technology consistent with present disclosure.Computer system 200 can include bus 212, and this bus can be by department of computer science
The major subsystems of system 200 is connected with each other, and such as central processing unit 214, Installed System Memory 217(are such as, RAM(random access memory
Device), ROM(read only memory), flash RAM or similar memorizer), input/output (I/O) controller 218, external audio device
(such as via the speaker system 220 of audio output interface 222), external device (ED) are (such as via the display of display adapter 226
Screen 224), serial port 228 with 230, keyboard 232(is connected by KBC 233), memory interface 234, operable use
In receiving the floppy disk 237 of floppy disk 238, can be used to the host bus adapter that is connected with fiber channel network 290
Device (HBA) interface card 235A, can be used to be connected to SCSI bus 239 host bus adaptor (HBA) interface card 235B,
And can be used to receive the CD drive 240 of CD 242.Mouse 246(or other pointing devices, warp can also be included
Be connected to bus 212 by serial port 228), modem 247(be connected to bus 212 via serial port 230) and
Network interface 248(is connected directly to bus 212), power supervisor 250 and battery 252.
Bus 212 allows the data communication between central processing unit 214 and Installed System Memory 217, as previously mentioned, in system
Deposit and can include read only memory (ROM) or flash memory (the most not shown) and random-access memory (ram) (not shown).RAM
Can be that main storage, operating system and application program can be loaded into wherein.Except other codes, ROM or flash memory can wrap
Containing the basic input output system (BIOS) controlling basic hardware operation (such as with peripheral assembly mutual).With computer system
200 application programs resided on together can be stored on a computer-readable medium and be conducted interviews by it, computer-readable
Medium e.g. hard disk drive (such as, fixed disk 244), CD (such as, CD-ROM driver 240), floppy disk unit 237 or its
His storage medium.Such as, anti-theft module 122, photo capture module 124 and upper transmission module 126 can reside on Installed System Memory 217
In.
It is readable that memory interface 234 can be connected to standard computer as other memory interfaces of computer system 200
Medium (such as consolidate disk drive 244) is for the storage of information and/or retrieval.Gu disk drive 244 can be department of computer science
A part for system 200 can be maybe independent and can be accessed by other interface systems.Modem 247 can lead to
Cross telephone link and being directly connected to or being provided to the Internet by Internet service provider (ISP) of remote server is provided
Be directly connected to.Network interface 248 can pass through straight-forward network link (this network link passes through POP(point of presence) and be connected to mutually
Networking) it is connected directly to remote server.Network interface 248 can utilize wireless technology to provide this connection, including numeral honeybee
Cellular telephone connection, Cellular Digital Packet Data (CDPD) connection, digital satellite data connection etc..
A lot of other devices (such as, document scanner, digital camera etc.) or subsystem (not shown) can use similar
Mode be attached.On the contrary, for implementing present disclosure, be not required to all devices shown in Fig. 2.These devices and subsystem
System can be connected with each other in the way of employing is different from shown in Fig. 2.The code of enforcement present disclosure can be stored in computer-readable and deposit
In storage media, such as one or more in Installed System Memory 217, solid dish 244, CD 242 or floppy disk 238.Implement present disclosure
Code can also be received and stored in memorizer by one or more interfaces.The operation system provided in computer system 200
System can be
Or operating system known to another kind of.
Power supervisor 250 can monitor the power level of battery 252.Power supervisor 250 can provide one or many
Individual API(application programming interfaces) to allow time window, the power determining power level, retaining before the system of shutting down computer 200
Whether consumption rate, computer system use civil power (such as, AC power) or the designator of the power of battery and other power
Relevant information.According to some embodiments, the API(of power supervisor 250 can be remotely accessed for example, it is possible to connected by network
Receiving asks that remote backup manages module).According to some embodiments, battery 252 can be or be positioned at computer system 200 this locality
Or uninterrupted power supply (ups) Unity away from it.In such an embodiment, power supervisor 250 can provide the power with UPS
The information that grade is relevant.
Fig. 3 illustrates multiple modules of client 120 according to an embodiment of present disclosure.As it can be seen, client 120
Can comprise one or more assembly, these assemblies include client anti-theft module 122, photo capture module 124 and upload mould
Block 126.
Following description describe the network element of system and method for a kind of criminal's imaging for providing improvement, calculating
Machine and/or assembly, this system and method includes one or more module.As used herein, term " module " can be interpreted as
Refer to software for calculation, firmware, hardware and/or their various combination.But, these modules be not construed as not hardware,
That implement on firmware or record on the readable recordable storage medium of processor software (that is, module is not software itself).Should
When it is noted that these modules are exemplary.These modules can be combination, integrated, independent and/or duplication,
To support various application program.It addition, the function performed in concrete module described herein can substitute this concrete module
Or except performing to perform and/or by one or more in other modules external one or more of this function in this concrete module
Other devices perform.Further, these modules can among multiple devices and/or closer to each other or away from other groups
Implement on part.It addition, these modules from a device removal and add to another device, and/or can may be embodied in
In the two device.
Client anti-theft module 122 can be configured to be identified as client terminal device (such as, client 120) to lose or
Stolen.In one embodiment, client can be filled by client anti-theft module 122 by access client unit state data
Put (such as, client 120) to be identified as losing or stolen.Client terminal device status data may indicate that one or more client
The possession state of device (such as, lose, stolen).In certain embodiments, client anti-theft module 122 can access communicativeness
The client terminal device status data on server (such as, antitheft back-end server) connected.
Client anti-theft module 122 can be arranged to determine client terminal device (such as, client 120) the most
Lose or stolen.In one embodiment, client anti-theft module 122 can be based on client terminal device (such as, client 120)
That produce or by geodata (such as, geographical sensing data, global positioning system (GPS) number representated by this client terminal device
According to) determine that this client terminal device has been lost or stolen.Such as, client anti-theft module 122 can be based on instruction visitor
Family end device (such as, client 120) has been moved off ad-hoc location (such as, 10 feet of distances, bedrooms outside specific office block
Outside 5 feet of distances) geodata determine that this client terminal device has been lost or stolen.In another embodiment
In, that client anti-theft module 122 can produce based on client terminal device (such as, client 120) or by this client terminal device
Representative mobile data determine that this client terminal device has been lost or stolen.Such as, client anti-theft module 122 can
With based on represent client terminal device (such as, client 120) moved a certain distance (such as, distance initial position 2 inches,
Distance initial position 1 inch) mobile data determine that this client terminal device has been lost or stolen.Implement at another
In example, that client anti-theft module 122 can produce based on this client terminal device (such as, client 120) or by this client
The stress data (force data) that device represents determines that this client terminal device has been lost or stolen.Such as, client
It is the most removed that end anti-theft module 122 can be connected to the security cable of this client terminal device (such as, client 120) based on expression
The stress data of (such as, mandatory remove) is to determine that this client terminal device has been lost or stolen.
Photo capture module 124 can be arranged to be identified as in response to by client terminal device (such as, client 120)
Lose or the stolen movement detecting this client terminal device.In one embodiment, photo capture module 124 can be by detection
Be connected to the video camera of client terminal device (such as, client 120) video image (such as, capture region) at least two frames it
Between difference detect the movement of this client terminal device.In such an embodiment, when picture trapping module 124 can compare first
Second frame of the visual pattern that the first frame of the visual pattern that quarter obtains and the second moment obtain, to determine whether this two frame difference
Bigger.It is to say, image capture module 124 can compare the pixel data of two different time points to determine this pixel data
Change with whether having timed, out (movement client terminal device such as, being detected).
In certain embodiments, if the mean difference in the pixel data of pixel group is (such as, predetermined beyond predetermined threshold
The difference of amount), photo capture module 124 may determine that and exists for larger difference between two frames.For example, it is possible to based on design partially
Well threshold value is defined as 25%.Therefore, if the average of at least 25% pixel that pixel data is between two frames changes, photo
Trapping module 124 may determine that and there is larger difference between two frames and detect movement.
In certain embodiments, if there is the difference of the pixel data of scheduled volume in scheduled time slot between multiframe, shine
Sheet trapping module 124 is assured that and there is enough difference.Such as, based on design preference, discrepancy threshold amount may determine that into
25%, the time period may determine that to be 1 second.Therefore, if the pixel data at least 25% pixel between multiframe is equal at least 1 second
Value changes, and photo capture module 124 may determine that and there is larger difference between multiframe and detect movement.
In another embodiment, photo capture module 124 by accessing and can be analyzed by accelerometer, movable sensor
The data produced with any one in inclination sensor or combination detect in client terminal device (such as, client 120)
Mobile.If passed it is to say, be connected to the accelerometer of client terminal device (such as, client 120), movable sensor and inclination
The data that sensor produces are beyond one or more predetermined thresholds, and photo capture module 124 is assured that and detects that client fills
The movement put.
In response to the movement of client terminal device (such as, client 120) being detected, photo capture module 124 can be configured
Utilize and be connected to the video camera of this client's section apparatus to capture one or more photo.In one embodiment, photo capture mould
Block 124 can be in response to detecting that the movement of client terminal device is to capture a series of photo.In another embodiment, in response to
The movement of client terminal device being detected, photo capture module 124 (such as, can be shone every 5 seconds capture 5 width based on predetermined space
Sheet, obtain 1 photos every several number of seconds) capture one or more photo.
Photo capture module 124 can be configured to the image of every width capture and calculate confidence level, positional value and chi
Very little value.In one embodiment, photo capture module 124 can be the confidence etc. that every photos calculates that face is included in photo
Level, this photo obtains by performing one or more face detection algorithms.The face detection performed by photo capture module 124
Algorithm can include such as pattern classification task algorithm (such as, implementing dual mode classification task), controlled background face detection
Algorithm (such as, smooth or static background removal with display and being detected face), colored face detection algorithms (such as, profit
Find face area with skin color), action face detection algorithms (such as, detection unique certain types of to face
Action, such as: the nostril blink, frown, opened, forehead wrinkly, the mouth that opens) and face detection based on model
In algorithm (such as, on image travel through facial model detect face) these face detection any one or combine.
In other embodiments, photo capture module 124 can be every photos calculate instruction comprise in photo can
The positional value of the position (such as, represent with distance) of energy face, this photo is by performing above-mentioned one or more face detection
Algorithm and obtain.Such as, relevant with the photo of capture for the first time primary importance value can represent possible in acquisition procedure
Face's about 100 feet of video camera of distance.In another example, the second position value relevant with the photo of second time capture can
To represent possible in acquisition procedure face about 2 feet of video camera of distance.
In another embodiment, photo capture module 124 can calculate size value, this size value for each photos
The size (such as, with height and width, represent with girth) of the possible face that instruction comprises in photo, this photo is by holding
Row above-mentioned one or more face detection algorithm and obtain.Such as, relevant to the photo of capture for the first time first size value
The face that can represent possible in acquisition procedure has the height of 2 centimetres and the width of 1 centimetre.Such as, with second time capture
Relevant the second size value of photo can represent that face possible in acquisition procedure has the height of 8 inches and 5 inches
Width.
Photo capture module 124 can be configured to based on corresponding confidence level, corresponding positional value and corresponding chi
Every photos of capture is ranked up by any one or the combination in very little value.Therefore, there is the highest confidence level, the shortest position
The photo of value and full-size value can be ordered as the highest.And there is minimum confidence level, the shortest positional value and minimum dimension value
Photo can be ordered as minimum.Photo capture module 124 can select have top ranked one or more also in photo
It is sent to server (such as, antitheft back-end server) to help to retrieve loss or stolen client terminal device.
Upper transmission module 126 can be arranged to the photo selected by server (such as, antitheft back-end server) transmission.
In one embodiment, upper transmission module 126 can be arranged to detect when client terminal device (such as, client 120) connects
It is connected to network (such as, the Internet).In response to detecting that network connects, upper transmission module 126 can be (such as, antitheft to server
Back-end server) transmit selected by photo.
Fig. 4 illustrates server anti-theft module 142 according to an embodiment of present disclosure.As it can be seen, server is antitheft
Module 142 can comprise one or more assembly, and these assemblies include loss/stolen identification module 400 and Photo Receiver module
402。
Following description describe the network element of system and method for criminal's imaging for providing improvement, computer
And/or assembly, this system and method includes one or more module.As used herein, term " module " can be interpreted as table
Show software for calculation, firmware, hardware and/or their various combinations.But, these modules are not construed as not at hardware, consolidate
That implement on part or record on the readable recordable storage medium of processor software (that is, module is not software itself).Should
It is noted that these modules are exemplary.These modules can be combination, integrated, independent and/or duplication, with
Just various application program is supported.It addition, described herein in concrete module perform function can substitute this concrete module or
Except performing and/or by other devices one or more in other modules external one or more of execution in this concrete module
Perform.Further, these modules can among multiple devices and/or closer to each other or away from other assemblies on real
Execute.It addition, these modules from a device removal and add to another device, and/or can may be embodied in the two
In device.
(such as, loss/stolen identification module 400 can be configured to the client terminal device of storage and multiple communication connections
Client 110,120) relevant client terminal device status data.Client terminal device status data may indicate that one or more visitor
The possession state of family end device (such as, lose, stolen).Therefore, when client terminal device is reported as losing or being stolen, lose
Mistake/stolen identification module 400 can update applicable client terminal device status data.
Photo Receiver module 402 can be arranged to from being identified as loss or stolen one or more communication link
The client terminal device (such as, client 110,120) connect receives one or more photo.In certain embodiments, Photo Receiver
Module 402 can store the photo received for regaining loss or stolen client terminal device.
Fig. 5 illustrates pixel data according to an embodiment of present disclosure.As it can be seen, be connected to client terminal device (example
Such as, client 120) the visual pattern 500 of video camera can comprise and organize pixel more.Such as, virtual image 500 can comprise picture
Element group 502,504,506,508,510,512,514,516,518.Each pixel groups can comprise 9 pixels.
Pixel datas based on two successive frames, it is believed that black picture element changes, and it is believed that white picture
Element does not changes.As it can be seen, pixel groups 502 can have the pixel difference of 33%, pixel groups 504 can have 67% pixel poor
Different, pixel groups 506 can have the pixel difference of 44%, pixel groups 508 that the pixel difference of 78%, pixel groups 510 can be had to have
The pixel difference of 44%, pixel groups 512 can have the pixel difference of 56%, pixel groups 514 can have the pixel difference of 56%, pixel
Group 516 can have the pixel difference of 44%, and pixel groups 518 can have the pixel difference of 56%.Based on these pixel difference, pixel
Mean pixel difference between two successive frames of group 502,504,506,508,510,512,514,516,518 is 53%.Such as,
If predetermined difference amount is 25%, the pixel data difference between two successive frames represented in Fig. 5 is at client terminal device to be detected
Movement on have larger difference.
Fig. 6 depicts according to an embodiment of present disclosure and provides the method 600 of the criminal's imaging improved.In module
602, method 600 can start.
In module 604, client terminal device can be identified as at least one in losing or being stolen.An embodiment
In, by the client terminal device status number of the upper storage of server (such as, antitheft back-end server) that capture connects at communicativeness
According to, can be identified as client terminal device losing or stolen.
In module 606, first pixel data relevant to the first frame of visual pattern and the second frame phase with visual pattern
Difference in the second pixel data closed detects on client terminal device.Can capture for the first time the first frame, and second time
The second frame can be captured.Detect that this species diversity may indicate that the movement of client terminal device.
In module 608, in response to this difference being detected, multiple photos can be captured on client terminal device.A reality
Execute in example, in response to this difference being detected, a series of multiple photos can be captured on client terminal device.In another embodiment
In, in response to this difference being detected, can be based on predetermined interval (such as, every 5 seconds 5 photos, every several seconds 1 width
Photo) capture one or more photo.
In module 610, method 600 can terminate.
Fig. 7 depicts another kind of for the method providing criminal's imaging of improvement according to an embodiment of present disclosure
700.In module 702, method 700 can start.
In module 704, in response at least one being identified as by client terminal device in losing and being stolen, this visitor can be captured
Multiple photos on the end device of family.In one embodiment, in response to difference being detected, can capture on this client terminal device
A series of multiple photos.In another embodiment, in response to difference being detected, can based on predetermined interval (such as, every
5 seconds 5 photos, every several seconds 1 photos) capture one or more photo.
In module 706, for each width in the multiple photos on client terminal device, determine putting of the photo comprising face
Letter grade.In one embodiment, by performing one or more face detection algorithm, each width of this multiple photos is determined
Confidence level.
In module 708, the confidence level of each width based on the multiple photos on this client terminal device, to this multiple photos
It is ranked up.In one embodiment, the photo with the highest confidence level is ordered as the highest, and will have minimum confidence etc.
The photo of level is ordered as minimum.
In module 710, the one or more having in this top ranked multiple photos are transmitted to server.At one
In embodiment, this one or more photo with the highest confidence level ranking is transmitted to back-end server (such as, after antitheft
End server).
In module 712, method 700 can terminate.
Now it should be noted that, the criminal that the offer of present disclosure improves in accordance with the above is imaged in a way
It is usually directed to process input data and produce output data.This input data process and output data produce can at hardware or
Implement on software.Such as, specific electronic building brick can be used in server anti-theft module or similar or relevant circuit, with
Present disclosure the most as described above implements the function relevant to providing the criminal's imaging improved.Alternately, according to finger
One or more processors of order operation present disclosure as described above can be implemented and provide the criminal's imaging improved
Relevant function.If situation is really such, in the range of present disclosure, these instructions can be stored in one or more process
On device readable storage medium storing program for executing (such as, disk or other storage mediums), or by one or more carrier waves embody one
Or the transmission of multiple signal is to one or more processors.
Present disclosure should not be limited in scope determined by specific embodiments described herein.Really, except retouching herein
Those embodiments stated, for those of ordinary skill in the art, other various enforcements that present disclosure is made an amendment
Example is obvious from the point of view of described above and accompanying drawing.Therefore, these other embodiments and modification are intended to fall within present disclosure
Within the scope of.And, although describing in the case of the specific implementation of specific environment for specific purpose herein
Present disclosure, but the effectiveness that those of ordinary skill in the art it will be appreciated that it is not restricted to this, and can be for
Arbitrarily purpose implements present disclosure in any environment beneficially.Therefore, claims presented below should be according to described herein
Whole ranges of present disclosure and spirit explain.
Claims (19)
1. for the method providing criminal's imaging of improvement, including:
One client terminal device is identified as at least one in losing and being stolen;
On this client terminal device, detect first pixel data relevant to a visual pattern first frame and regard with this
A difference in the second pixel data that one the second frame of feel image is correlated with;
On this client terminal device, capture multiple photos in response to detecting this difference;
On this client terminal device, determine a confidence level of each width in this multiple photos;With
On this client terminal device, this multiple photos is ranked up by confidence level based on width each in this multiple photos.
2. the method for claim 1, at least one being wherein identified as by this client terminal device in losing and being stolen is entered
One step includes accessing the client terminal device status data stored on one server.
3. the method for claim 1, wherein detects this difference and farther includes to detect first relevant to many group pixels
A difference in pixel data and the second pixel data relevant to this many groups pixel.
4. method as claimed in claim 3, wherein detects this difference and farther includes to detect relevant to this many groups pixel the
A mean difference in one pixel data and the second pixel data relevant to this many groups pixel.
5. the method for claim 1, wherein detects this difference and farther includes detection beyond the one of a predetermined threshold
Individual difference.
6. the method for claim 1, wherein detects this difference and further includes at detection one in a predetermined amount of time
Individual difference.
7. the method for claim 1, farther includes:
By a network, the top ranked one or more that have in this multiple photos are transmitted to a server.
8. method as claimed in claim 7, wherein determines that this confidence level farther includes to perform a face detection algorithms.
9. method as claimed in claim 7, further includes on this client terminal device as each width in this multiple photos
Determining a positional value, this positional value indicates position that may be facial in a photos.
10. method as claimed in claim 9, further includes on this client terminal device as each width in this multiple photos
Determining a size value, this size value indicates size that may be facial in a photos.
11. methods as claimed in claim 10, are wherein ranked up this multiple photos farther including to shine based on these several
In sheet, the confidence level of each width, positional value and size value are ranked up.
12. 1 kinds of systems being used for providing criminal's imaging of improvement, this system includes:
For a client terminal device being identified as the device of at least one in losing and being stolen;
First pixel data relevant to a visual pattern first frame for detection on this client terminal device and with
The device of a difference in the second pixel data that one the second frame of this visual pattern is relevant;
For capturing the device of multiple photos on this client terminal device in response to this difference of detection;
For determining the device of a confidence level of each width in this multiple photos on this client terminal device;With
For confidence level based on width each in this multiple photos on this client terminal device, this multiple photos is ranked up
Device.
13. 1 kinds of systems being used for providing criminal's imaging of improvement, including:
It is communicatively connected to one or more processors of a network;Wherein these one or more processors are configured to:
One client terminal device is identified as at least one in losing and being stolen;
On this client terminal device, detect first pixel data relevant to a visual pattern first frame and regard with this
A difference in the second pixel data that one the second frame of feel image is correlated with;
On this client terminal device, capture multiple photos in response to detecting this difference;
On this client terminal device, determine a confidence level of each width in this multiple photos;With
On this client terminal device, this multiple photos is ranked up by confidence level based on width each in this multiple photos.
14. systems as claimed in claim 13, wherein these one or more processors are configured to access at clothes
On business device, this client terminal device is identified as at least one in losing and being stolen by the client terminal device status data of storage.
15. systems as claimed in claim 13, wherein these one or more processors are configured to detection and organize picture more
A difference in plain the first relevant pixel data and the second pixel data relevant to this many groups pixel detects this difference.
16. systems as claimed in claim 15, wherein these one or more processors are configured to detect and these many groups
A mean difference in the first pixel data that pixel is relevant and the second pixel data relevant to this many groups pixel detects
This difference.
17. systems as claimed in claim 13, wherein these one or more processors are configured to detection beyond one
One difference of predetermined threshold detects this difference.
18. systems as claimed in claim 13, wherein these one or more processors are configured to a pre-timing
Between in section one difference of detection detect this difference.
19. systems as claimed in claim 13, wherein these one or more processors are configured to:
By a network, the top ranked one or more that have in this multiple photos are transmitted to a server.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/964,972 US8730334B2 (en) | 2010-12-10 | 2010-12-10 | Techniques for providing improved perpetrator imaging |
US12/964972 | 2010-12-10 | ||
US12/964,972 | 2010-12-10 | ||
PCT/US2011/064007 WO2012078914A1 (en) | 2010-12-10 | 2011-12-08 | Method and device for providing improved perpetrator imaging |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103339978A CN103339978A (en) | 2013-10-02 |
CN103339978B true CN103339978B (en) | 2016-08-10 |
Family
ID=45464849
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201180066022.2A Active CN103339978B (en) | 2010-12-10 | 2011-12-08 | For providing the technology of criminal's imaging of improvement |
Country Status (6)
Country | Link |
---|---|
US (1) | US8730334B2 (en) |
EP (1) | EP2649834B1 (en) |
JP (1) | JP5934244B2 (en) |
CN (1) | CN103339978B (en) |
CA (1) | CA2821090C (en) |
WO (1) | WO2012078914A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103220637A (en) * | 2012-01-19 | 2013-07-24 | 腾讯科技(深圳)有限公司 | Mobile phone anti-theft protection method and mobile phone anti-theft protection device |
US9558338B2 (en) * | 2012-11-07 | 2017-01-31 | Htc Corporation | Method and apparatus for performing security control by using captured image |
CN104361303A (en) * | 2014-10-22 | 2015-02-18 | 小米科技有限责任公司 | Terminal exception processing method and device and electronic equipment |
US10157190B2 (en) * | 2016-03-28 | 2018-12-18 | Microsoft Technology Licensing, Llc | Image action based on automatic feature extraction |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101449280A (en) * | 2006-06-08 | 2009-06-03 | 国际商业机器公司 | A validation engine |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10301655A (en) * | 1997-04-25 | 1998-11-13 | Nec Niigata Ltd | Built-in security function personal computer and its recording medium |
US20020097145A1 (en) | 1997-11-06 | 2002-07-25 | David M. Tumey | Integrated vehicle security system utilizing facial image verification |
AUPP400998A0 (en) * | 1998-06-10 | 1998-07-02 | Canon Kabushiki Kaisha | Face detection in digital images |
JP3727798B2 (en) * | 1999-02-09 | 2005-12-14 | 株式会社東芝 | Image surveillance system |
JP2000330663A (en) * | 1999-05-18 | 2000-11-30 | Nec Corp | Burglar monitoring device |
JP5032846B2 (en) * | 2004-08-31 | 2012-09-26 | パナソニック株式会社 | MONITORING DEVICE, MONITORING RECORDING DEVICE, AND METHOD THEREOF |
JP2007195063A (en) * | 2006-01-20 | 2007-08-02 | Sharp Corp | Portable terminal device |
JP2008005025A (en) * | 2006-06-20 | 2008-01-10 | Nec Saitama Ltd | Mobile wireless terminal |
US9729696B2 (en) | 2006-09-20 | 2017-08-08 | Samsung Electronics Co., Ltd | Method and system for tracking mobile communication device using MMS |
US9083624B2 (en) | 2007-03-02 | 2015-07-14 | Activetrak, Inc. | Mobile device or computer theft recovery system and method |
JP4775306B2 (en) * | 2007-04-23 | 2011-09-21 | ソニー株式会社 | Image processing apparatus, imaging apparatus, image display control method, and computer program |
US9576157B2 (en) * | 2008-04-02 | 2017-02-21 | Yougetitback Limited | Method for mitigating the unauthorized use of a device |
US9031536B2 (en) | 2008-04-02 | 2015-05-12 | Yougetitback Limited | Method for mitigating the unauthorized use of a device |
US8483659B2 (en) * | 2009-02-26 | 2013-07-09 | Qualcomm Incorporated | Methods and systems for recovering lost or stolen mobile devices |
-
2010
- 2010-12-10 US US12/964,972 patent/US8730334B2/en active Active
-
2011
- 2011-12-08 WO PCT/US2011/064007 patent/WO2012078914A1/en active Application Filing
- 2011-12-08 EP EP11806034.2A patent/EP2649834B1/en active Active
- 2011-12-08 CN CN201180066022.2A patent/CN103339978B/en active Active
- 2011-12-08 JP JP2013543355A patent/JP5934244B2/en active Active
- 2011-12-08 CA CA2821090A patent/CA2821090C/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101449280A (en) * | 2006-06-08 | 2009-06-03 | 国际商业机器公司 | A validation engine |
Also Published As
Publication number | Publication date |
---|---|
JP2014506041A (en) | 2014-03-06 |
WO2012078914A1 (en) | 2012-06-14 |
US20120147203A1 (en) | 2012-06-14 |
EP2649834B1 (en) | 2016-03-02 |
CA2821090A1 (en) | 2012-06-14 |
US8730334B2 (en) | 2014-05-20 |
EP2649834A1 (en) | 2013-10-16 |
CN103339978A (en) | 2013-10-02 |
CA2821090C (en) | 2016-09-13 |
JP5934244B2 (en) | 2016-06-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108475326B (en) | Method for providing service associated with image, storage medium, and electronic device | |
AU2016212943B2 (en) | Image processing method and electronic device for supporting the same | |
US10504001B2 (en) | Duplicate/near duplicate detection and image registration | |
US20190197365A1 (en) | Device and method for processing metadata | |
CN103119595B (en) | Shared by the automatic media hitting by shutter | |
CN106105185B (en) | Indicate method, mobile device and the computer readable storage medium of the profile of user | |
US20140293069A1 (en) | Real-time image classification and automated image content curation | |
CN106165386A (en) | For photo upload and the automatic technology of selection | |
KR20170019823A (en) | Method for processing image and electronic device supporting the same | |
CN109417584B (en) | Suggesting image files for deletion based on image file parameters | |
KR20170136920A (en) | Method for Outputting Screen and the Electronic Device supporting the same | |
CN103339978B (en) | For providing the technology of criminal's imaging of improvement | |
US20140071160A1 (en) | Electronic apparatus and display control method | |
CN107646109A (en) | Manage the characteristic of the environment mapping on electronic equipment | |
CN106254807B (en) | Electronic device and method for extracting still image | |
CN113409056B (en) | Payment method and device, local identification equipment, face payment system and equipment | |
US10091436B2 (en) | Electronic device for processing image and method for controlling the same | |
CN112084157A (en) | File recovery method and device, computer equipment and storage medium | |
WO2023121708A1 (en) | Image group classifier in a user device | |
US20160110427A1 (en) | Apparatus, system, and method for organizing and embedding applications | |
CN113703956A (en) | Training task execution method, device, equipment and storage medium | |
KR20150106621A (en) | Terminal and service providing device, control method thereof, computer readable medium having computer program recorded therefor and image searching system | |
US20190188507A1 (en) | Altering Biometric Data Found in Visual Media Data | |
CN111738282A (en) | Image recognition method based on artificial intelligence and related equipment | |
WO2023121707A1 (en) | Ranking images in an image group |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: California, USA Patentee after: Norton identity protection Address before: California, USA Patentee before: Symantec Corp. |
|
CP01 | Change in the name or title of a patent holder |